Skip to main content
purple hex pattern
man and woman on laptop on server room

nShield general purpose HSMs

nShield HSMs provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption, key management, and more. nShield hardware security modules are available in a range of FIPS 140-2 & 140-3* certified form factors and support a variety of deployment scenarios.

*Coordination Stage.

Our Portfolio

nshield 5c

nShield 5c HSM

nShield 5c HSMs are security appliances that deliver cryptographic services to applications across the network, in the cloud, and in hybrid environments. Deliver cryptographic key services to applications distributed across servers and virtual machines with Entrust’s crypto-agile, highly scalable, next-generation hardware security modules (HSMs).
nShield 5s HSM product image

nShield 5s HSM

nShield 5s HSMs are PCIe cards that perform encryption, digital signing, and key generation for an extensive range of commercial and custom-built applications, including certificate authorities, code signing, and more.
nshield connect image

nShield Connect

Enhance security with nShield Connect HSMs - certified, networked appliances providing cryptographic key services across servers and virtual machines.
promo shield solo image

nShield Solo

nShield Solo HSMs are PCI-Express card-based solutions that deliver cryptographic key services to applications hosted on individual servers and appliances.

nShield as a Service

Discover how nShield as a Service (nSaaS) can help your organization leverage cryptographic services in the cloud.
HSM nShield Edge product image

nShield Edge

nShield Edge hardware security modules (HSMs) are portable USB-connected HSMs that provide cryptographic key services for low-volume transaction environments.
nshield connect image

nShield HSMi

Certified hardware designed to deliver scalable cryptographic services for issuance software

HSM Management and Monitoring

Cut operational costs, increase uptime, and improve efficiency by managing and overseeing your nShield HSMs from one location. Learn more about each product below.

The nShield Difference: Security World

Only nShield HSMs feature Security World, a specialized architecture that provides unmatched capabilities in several crucial areas:

administrator settings icon

Full Control

Security World provides strong, granular controls over the access and usage of keys and policies.

cloud with arrow up icon

Easier Backups

Unlike alternatives that require backup HSMs and labor-intensive HSM cloning, Security World enables simple, automated backups of HSM files.

square expand icon

Scalability and Flexibility

Security World delivers unlimited key storage and the flexibility needed to align your HSM operations with your organization’s specific needs.

wired network icon

Streamlined HSM Operations

nShield HSMs can be managed centrally based on unified policy and operational administration, no matter how many nShields you deploy.

Security World Architecture White Paper

Product Uses

plum checkmark icon

Public Key Infrastructure

nShield HSMs generate and protect root and certificate authority (CA) keys, providing support for PKIs across a variety of use cases.

plum checkmark icon

Code Signing

nShield HSMs sign your application code so you can ensure that your software remains secure, unaltered and authentic.

plum checkmark icon

Digital Certificates

nShield HSMs create digital certificates for credentialing and authenticating proprietary electronic devices for IoT applications and other network deployments.

nShield Software Products


Develop and execute sensitive code within a FIPS 140-2 Level 3 certified nShield hardware security module.

faded gray hex background

Software Option Packs

Software that extends the capability of your HSMs to fit your needs.

faded gray hex background

nShield Web Services Option Pack

Rely on a cloud-friendly REST-like interface for high-assurance nShield HSMs.

faded gray hex background

Time Stamping

We deliver secure, accurate time stamping that ensures integrity and traceability for digital records, code signing, transactions, logs, and more.

faded gray hex background

nShield Cloud Integration Option Pack

Use your nShield HSMs to generate, store, and manage the keys you count on to secure your sensitive cloud-hosted applications.

faded gray hex background

nShield Database Security Option Pack

Integrate with Microsoft SQL Server using Microsoft’s Extensible Key Management (EKM) API.

faded gray hex background

nShield Container Option Pack

Deploy containerized applications integrated with high-assurance FIPS 140-2 nShield HSMs with the nShield Container Option Pack (nCOP).

faded gray hex background